1 min read time

Join Us at Authenticate 2024!

by   in Cybersecurity

It’s October, which means that Authenticate 2024 is coming up fast. OpenText will again be a sponsor, this time at a platinum level. Authenticate is still hosted by the FIDO Alliance, and for the second year in a row, the venue is the Omni La Costa Resort next to the Batiquitos Lagoon in Carlsbad, California. Not surprisingly, Authenticate’s theme is to deliver information that helps organizations modernize their authentication implementations. FIDO standards go a long way in helping organizations move beyond passwords.

As stated in Authenticate’s abstract, the conference is dedicated to helping organizations modernize their authentication infrastructure, graduating to passwordless authentication using FIDO standards. They note that FIDO standards help organizations move from passwords and legacy forms of multi-factor authentication to provide users with passkeys for phishing-resistant sign-ins, as well as gaining an improved user experience with faster sign-in rates.

While FIDO has been a notable force in helping organizations move to passwordless authentication, there is more to the secure access use case. While passwordless has the ability to lower authentication friction, more pieces are needed to leverage the advantages it offers to deliver secure access to protected information. Implementing multiple passwordless methods offers more than just letting users choose the method that they prefer; it can be used to maintain security while delivering single sign-on and context-driven authorization. At a higher level, the key point is investing in passwordless technology without updating your access management environment, which really shortchanges your investment.  

As part of Authenticate’s Enterprise track, Rick Killpack extends out into the broader use case. Here is Rick’s abstract:

Considerations of Leveraging Entra ID Across All Enterprise Applications

In this session, you will hear what large enterprises are struggling with as they introduce passwordless authentication. How do you balance minimizing end-user friction and security? How do you leverage passwordless authentication with federated applications, LDAP Browser applications, mainframe systems, databases, etc? Are there concerns about non-carbon-based authentications? Should you leverage extended FIDO capabilities to authorize as well as authenticate?

Rick's breakout session will be held on Tuesday afternoon, going from 2:00 to 2:25.

In addition to the breakout session, OpenText will be at booth 208 in the Expo Center for additional information and demos.  

Labels:

Identity & Access Mgmt